You are on page 1of 8

1

S.NO PROJECT TITLE DOMAIN

1. A Comprehensive Study on Social Network Mental Disorders


Network
Detection via Online Social Media Mining
2. An Approach to Balance Maintenance Costs and
CLOUD COMPUTING
Electricity Consumption in Cloud Data Centers
3. An Efficient Method for High Quality and Cohesive Topical
DATA MINING
Phrase Mining
4. Analyzing and Detecting Money-Laundering Accounts in Online
Networks
Social Networks
5. A New Service Mechanism for Profit Optimizations of a Cloud
CLOUD COMPUTING
Provider and Its Users
6. A Hybrid Approach for Detecting Automated Spammers in
DATA MINING
Twitter
7.
Detection of suicide-related posts in Twitter data streams DATA MINING

8.
Credit Card Fraud Detection Using AdaBoost and Majority Voting DATA MINING

9. A Lightweight Secure Data Sharing Scheme for Mobile Cloud


CLOUD COMPUTING
Computing
10. A proxy-based collaboration system to minimize content
MOBILE COMPUTING
downloads time and energy consumption
11. Collaborative Filtering-Based Recommendation
DATA MINING
of Online Social Voting
12. A Novel Efficient Remote Data Possession
CLOUD COMPUTING
Checking Protocol in Cloud Storage
13. A robust reputation management mechanism in
CLOUD COMPUTING
the federated cloud
14. A Cross Tenant Access Control (CTAC) Model for CLOUD COMPUTING
Cloud Computing: Formal Specification and
Verification
15. RAAC: Robust and Auditable Access Control with Multiple
CLOUD COMPUTING
Attribute Authorities for Public Cloud Storage
16. Pro Guard Detecting Malicious Accounts in Social-Network-
SECURE COMPUTING
Based Online Promotions
17. Network Capability in Localizing Node Failures via End-to-End
NET WORKING
Path Measurements
18.
Securing Cloud Data under Key Exposure CLOUD COMPUTING

19. Transactional Behavior Verification in Business Process as a


SECURE COMPUTING
Service Configuration
20. Detecting Stress Based on Social Interactions in Social
DATA MINING
Networks
21.
Dynamic Facet Ordering for Faceted Product Search Engines DATA MINING

22.
A Locality Sensitive Low-Rank Model for Image Tag Completion IMAGE PROCESSING

23. A Modified Hierarchical Attribute-Based Encryption Access


CLOUD COMPUTING
Control Method for Mobile Cloud Computing
24. A Novel Recommendation Model Regularized with User Trust
DATA MINING
and Item Ratings
25. Personal Web Revalidation by Context and Content Keywords
DATA MINING
with Relevance Feedback
26.
Query Driven Approach to Entity Resolution DATA MINING

27. My Privacy My Decision: Control of Photo Sharing on Online


IMAGE PROCESSING
Social Networks
28.
A Hop-by-Hop Routing Mechanism for Green Internet NET WORKING

29. A Scalable Approach for Content-Based Image Retrieval in Peer-


IMAGE PROCESSING
to-Peer Networks
30. A Stable Approach for Routing Queries in Unstructured P2P
NETWORKING
Networks
31. An Efficient File Hierarchy Attribute-Based Encryption Scheme
CLOUD COMPUTING
in Cloud Computing
32.
An Efficient Privacy-Preserving Ranked Keyword Search Method CLOUD COMPUTING

33. FUZZY SYSTEMS


Answering Approximate Queries Over XML Data

34. Automatically Mining Facets for Queries from Their Search


DATA MINING
Results
35.
Booster in High Dimensional Data Classification DATA MINING

36. Building an intrusion detection system using a filter-based


DATA MINING
feature selection algorithm
37. CDA Generation and Integration for Health Information
CLOUD COMPUTING
Exchange Based on Cloud Computing System
38. Conditional Identity-Based Broadcast Proxy Re-Encryption and
CLOUD COMPUTING
Its Application to Cloud Email
39. Conjunctive Keyword Search With Designated Tester and Timing
CLOUD COMPUTING
Enabled Proxy Re-Encryption Function for E-Health Clouds
40. Connecting Social Media to E-Commerce: Cold-Start Product
DATA MINING
Recommendation Using Microblogging Information
41. Cross-Domain Sentiment Classification Using Sentiment
DATA MINING
Sensitive Embeddings
42. Cyber bullying Detection based on Semantic-Enhanced
DATA MINING
Marginalized Denoising Auto-Encoder
43.
Data Lineage in Malicious Environments SECURE COMPUTING

44. Detecting Node Failures in Mobile Wireless Networks: A


MOBILE COMPUTING
Probabilistic Approach
45. CLOUD COMPUTING
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environments
46. DiploCloud: Efficient and Scalable Management of RDF Data in
CLOUD COMPUTING
the Cloud
47. Domain-Sensitive Recommendation with User-Item Subgroup
DATA MINING
Analysis
48. Dual-Server Public-Key Encryption With Keyword Search for
CLOUD COMPUTING
Secure Cloud Storage
49. Dynamic and Public Auditing with Fair Arbitration for Cloud
CLOUD COMPUTING
Data
50.
Efficient Algorithms for Mining Top-K High Utility Itemsets DATA MINING

51.
Efficient Cache-Supported Path Planning on Roads DATA MINING

52. Enabling Cloud Storage Auditing With Verifiable Outsourcing of


CLOUD COMPUTING
Key Updates
53. Energy and Memory Efficient Clone Detection in Wireless Sensor
MOBILE COMPUTING
Networks
54. EPLQ: Efficient Privacy-Preserving Location-Based Query Over
MOBILE COMPUTING
Outsourced Encrypted Data
55. Fine-Grained Two-Factor Access Control for Web-Based Cloud
CLOUD COMPUTING
Computing Services
56. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud
CLOUD COMPUTING
Computing
57. Identity-Based Encryption with Cloud
CLOUD COMPUTING
Revocation Authority and Its Applications
58.
Geometric Range Search on Encrypted Spatial Data CLOUD COMPUTING

59. Identity-Based Data Outsourcing with


CLOUD COMPUTING
Comprehensive Auditing in Clouds
60. Identity-Based Encryption with Cloud Revocation Authority and
CLOUD COMPUTING
Its Applications
61. Identity-Based Proxy-Oriented Data Uploading and Remote Data
CLOUD COMPUTING
Integrity Checking in Public Cloud
62. Inference Attack on Browsing History of Twitter Users using
SECURE COMPUTING
Public Click Analytics and Twitter Metadata
63.
iPath: Path Inference in Wireless Sensor Networks NETWORKING

64. Learning of Multimodal Representations With Random Walks on


IMAGE PROCESSING
the Click Graph
65. Location Aware Keyword Query Suggestion Based on Document
DATA MINING
Proximity
66. Mining User-Aware Rare Sequential Topic Patterns in Document
DATA MINING
Streams
67.
Nearest Keyword Set Search in Multi-Dimensional Datasets DATA MINING

68. Online Multi-Modal Distance Metric Learning with Application to IMAGE PROCESSING
Image Retrieval
69. Opportunistic Routing With Congestion Diversity in Wireless Ad NETWORKING
Hoc Networks
70. Profiling Online Social Behaviors for Compromised Account INFORMATION FORENSICS
Detection AND SECURITY
71. Protecting Your Right: Verifiable Attribute-Based Keyword
Search with Fine-Grained Owner-Enforced Search Authorization CLOUD COMPUTING
in the Cloud
72. Rating Prediction based on Social Sentiment from Textual
DATA MINING
Reviews
73. Secure Optimization Computation Outsourcing In Cloud
CLOUD COMPUTING
Computing: A Case Study Of Linear Programming
74. Secure Overlay Routing Using Key Pre-Distribution: A Linear
MOBILE COMPUTING
Distance Optimization Approach
75.
Sentiment Embeddings With Applications To Sentiment Analysis DATA MINING

76. A Profit Maximization Scheme With Guaranteed Quality Of


CLOUD COMPUTING
Service In Cloud Computing
77. Captcha As Graphical Passwords—A New Security Primitive
SECURE COMPUTING
Based On Hard Ai Problems
78. Cost-Effective Resource Allocation Of Overlay Routing Relay
NETWORKING
Nodes
79. Software Puzzle: A Countermeasure to Resource-Inflated Denial-
SECURE COMPUTING
of-Service Attacks
80.
Discovery of Ranking Fraud for Mobile Apps SECURE COMPUTING

81.
Stealthy Denial Of Service Strategy In Cloud Computing CLOUD COMPUTING

82. A Secure and Dynamic Multi-keyword Ranked Search Scheme


CLOUD COMPUTING
over Encrypted Cloud Data
83. Privacy-Preserving and Truthful Detection of Packet Dropping
MOBILE COMPUTING
Attacks in Wireless Ad Hoc Networks
84. Privacy Policy Inference of User-Uploaded Images on Content
IMAGE PROCESSING
Sharing Sites
85. Dynamic Routing For Data Integrity And Delay Differentiated
MOBILE COMPUTING
Services In Wireless Sensor Networks
86.
Efficient Authentication For Mobile And Pervasive Computing MOBILE COMPUTING

87. A Secure Anti-Collusion Data Sharing Scheme For Dynamic


CLOUD COMPUTING
Groups In The Cloud
88.
A Computational Dynamic Trust Model For User Authorization MOBILE COMPUTING

89. Cost-Effective Authentic And Anonymous Data Sharing With PARALLEL &
Forward Security DISTRIBUTEDSYSTEMS
90. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption
CLOUD COMPUTING
With Verifiable Delegation In Cloud Computing
91. Privacy-Preserving Multi-Keyword Ranked Search Over
CLOUD COMPUTING
Encrypted Cloud Data
92. Control Cloud Data Access Privilege And Anonymity With Fully
CLOUD COMPUTING
Anonymous Attribute-Based Encryption
93.
An Attribute-Assisted Reranking Model For Web Image Search IMAGE PROCESSING

94. Progressive Duplicate Detection


DATA MINING

95. Cloud armor: Supporting Reputation-Based Trust Management


CLOUD COMPUTING
For Cloud Services
96. Improved Privacy-Preserving P2p Multimedia Distribution
SECURE COMPUTING
Based On Recombined Fingerprints
97. Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud
SECURE COMPUTING
Storage
98.
A Hybrid Cloud Approach For Secure Authorized Deduplication CLOUD COMPUTING

99. Audit-Free Cloud Storage Via Deniable Attribute-Based


CLOUD COMPUTING
Encryption
100. Co-Extracting Opinion Targets And Opinion Words From Online
DATA MINING
Reviews Based On The Word Alignment Model
101.
Learning To Rank Image Tags With Limited Training Examples IMAGE PROCESSING

102. Bestpeer++: A Peer-To-Peer Based Large-Scale Data Processing


DATA MINING
Platform
103. A Lightweight Secure Scheme for Detecting Provenance Forgery
MOBILE COMPUTING
and Packet Drop Attacks in Wireless Sensor Networks
104.
Decentralized Access Control with Anonymous Authentication CLOUD COMPUTING
105.
An Attribute-Assisted Re-ranking Model for Web Image Search DATA MINING

106.
Automatic Test Packet Generation NETWORKING

107.
Data Mining with Big Data DATA MINING

You might also like